-
All
-
Online
-
Filters
IT Governance Europe Ltd courses
- Course
- Distance Learning
...Assist in meeting the applicable authorised economic operator (AEO) criteria set forth in the World Customs Organization Framework of Standards and conforming...
- Course
- Distance Learning
...Defines the rules applicable for the audit and certification of a supply chain security management system complying with the supply chain security management...
- Course
- Distance Learning
...Gives you a thorough understanding of the principles of ISO28000, helping you to understand what you need to do in order to achieve certification to the standard...
- Course
- Distance Learning
...site into the secure corporate network. The book begins with an overview of AAA and TACACS+ and Radius protocols. A discussion of authentication on Cisco...
- Course
- Distance Learning
...review and control of organizational privileges. Description This book shows you how Role-Based Access Control (RBAC) simplifies security administration by using roles...
- Course
- Distance Learning
...Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management...
- Vocational qualification
- Distance Learning
...This same accessibility also makes Electronic Access Control ideal for hard-pressed practitioners. Author: Gerard Honey Publisher: NEWNES ISBN...
- Course
- Distance Learning
...Bruce Schneier, CTO, Counterpane, and author of Secrets and Lies 'A must-read for anyone writing software for the Internet.' -Jeremy Epstein...
- Course
- Distance Learning
...Description This volume delivers a comprehensive overview of database and applications security for technical managers, technologists, and executives... Learn about: Data Management...
- Course
- Distance Learning
...pragmatic instruction, and extensive code samples in Microsoft Visual C# to help you develop Web applications that are more robust, more reliable...
- Course
- Distance Learning
...It draws you in with anecdotes, but builds from there. In a few chapters you find yourself deep in the intimate details of software security...
- Course
- Distance Learning
...Penetration testing. Security testing. Abuse case development. In addition to the touchpoints, Software Security covers knowledge management...
- Course
- Distance Learning
...proven methodology that measurably minimizes security bugs-the Security Development Lifecycle (SDL ) . In this long-awaited book, security experts Michael...
- Course
- Distance Learning
...and develop countermeasures in the design, coding, and testing phases. This book is the first to cover this subject in-depth. Description Threat modeling...
- Course
- Distance Learning
...such as firewalls and authentication. In addition, there are plenty of code samples in C# on the Web. Designed to complement and extend Writing Secure...
- Course
- Distance Learning
...It also includes enhanced coverage of buffer overruns, Microsoft .NET security, and Microsoft ActiveX development, plus practical checklists for developers...
- Course
- Distance Learning
...they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might...
- Course
- Distance Learning
...Wired Magazine '. . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers...
- Course
- Distance Learning
...Author: David Hook Publisher: John Wiley ISBN 10: 0764596330 ISBN 13: 9780764596339 Pages: 448 Format: Soft Cover Published Date: August 2005 Availability...
- Course
- Distance Learning
...in modern cryptography and his book offers a practical understanding of essential tools and applications to help with your daily work.' ' There is complete...